Submitted:
19 May 2025
Posted:
20 May 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Literature Review
3. Methodology
3.1. Questionnaire-Based Data Collection
3.2. Interview-Based Elicitation
3.3. Requirement Analysis and Goal Mapping
3.4. Integration with Quality Standards and Industry Models
6. Discussion
7. Conclusion and Future Work
References
- Samala, A. D., Rawas, S., Criollo-C, S., Bojic, L., Prasetya, F., Ranuharja, F., & Marta, R. (2024). Emerging technologies for global education: A comprehensive exploration of trends, innovations, challenges, and future horizons. SN Computer Science, 5(8), 1-24. [CrossRef]
- Realpe-Muñoz, P., Collazos, C. A., Granollers, T., Muñoz-Arteaga, J., & Fernandez, E. B. (2017, September). Design process for usable security and authentication using a user-centered approach. In Proceedings of the XVIII International Conference on Human Computer Interaction (pp. 1-8).
- Ukeje, N., Gutierrez, J., & Petrova, K. (2024). Information security and privacy challenges of cloud computing for government adoption: a systematic review. International Journal of Information Security, 23(2), 1459-1475. [CrossRef]
- Elimadi, I., Chafiq, N., & Ghazouani, M. (2024). Artificial intelligence in the context of digital learning environments (DLEs): Towards adaptive learning. In Engineering applications of artificial intelligence (pp. 95-111). Cham: Springer Nature Switzerland.
- Saeed, S. (2016). Surveillance system concept due to the uses of face recognition application. Journal of Information Communication Technologies and Robotic Applications, 7(1), 17-22.
- Saeed, S. (2019). A conceptual system on ubiquitous cardiovascular health-care system (UCHS). SSUET, 9(1), 15-19.
- Saeed, S. (2018). Performance analysis of quality assurance due to the usage of two enterprise resource planning systems: Microsoft Dynamics AX and SAP. Mehran University of Engineering Journal (MUET), 37(2), 337-350.
- Saeed, S., Jhanjhi, N. Z., Naqvi, S. M. R., & Khan, A. (2022). Cost optimization of software quality assurance. In Deep learning in data analytics: Recent techniques, practices and applications (pp. 241–255).
- Saeed, S., Jhanjhi, N. Z., Naqvi, S. M. R., & Khan, A. (2022). Analytical approach for security of sensitive business cloud. In Deep learning in data analytics: Recent techniques, practices and applications (pp. 257–266).
- Clegg, K., Schubert, T. J., Block, R. C., Burke, F., Desai, N. R., Greenfield, R., ... & Jones, L. K. (2023). Translating Evidence-based Approaches into optimal Care for individuals at High-risk of ASCVD: Pilot testing of case-based e-learning modules and design of the TEACH-ASCVD study. Journal of Clinical Lipidology, 17(5), 592-601. [CrossRef]
- Al-Fraihat, D., Joy, M., Masa'deh, R. E., & Sinclair, J. (2020). Evaluating E-learning systems success: An empirical study. Computers in human behavior, 102, 67-86. [CrossRef]
- Ali, A., Alrasheedi, M., Ouda, A., & Capretz, L. F. (2015). A study of the interface usability issues of mobile learning applications for smart phones from the users perspective. arXiv preprint arXiv:1501.01875. [CrossRef]
- Zamora-Antuñano, M. A., Rodríguez-Reséndiz, J., Cruz-Pérez, M. A., Rodríguez Reséndíz, H., Paredes-García, W. J., & Díaz, J. A. G. (2021). Teachers’ perception in selecting virtual learning platforms: A case of mexican higher education during the COVID-19 crisis. Sustainability, 14(1), 195.
- Gopi, R., Sathiyamoorthi, V., Selvakumar, S., Manikandan, R., Chatterjee, P., Jhanjhi, N. Z., & Luhach, A. K. (2022). Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things. Multimedia Tools and Applications, 1-19. [CrossRef]
- Chesti, I. A., Humayun, M., Sama, N. U., & Jhanjhi, N. Z. (2020, October). Evolution, mitigation, and prevention of ransomware. In 2020 2nd International Conference on Computer and Information Sciences (ICCIS) (pp. 1-6). IEEE.
- Alkinani, M. H., Almazroi, A. A., Jhanjhi, N. Z., & Khan, N. A. (2021). 5G and IoT based reporting and accident detection (RAD) system to deliver first aid box using unmanned aerial vehicle. Sensors, 21(20), 6905.
- Babbar, H., Rani, S., Masud, M., Verma, S., Anand, D., & Jhanjhi, N. (2021). Load balancing algorithm for migrating switches in software-defined vehicular networks. Computational Materials and Continua, 67(1), 1301-1316. [CrossRef]
- Cahyanto, I., Madihah, H., Budiarso, I., Sutrisno, A., & Hidayat, T. (2024). Effectiveness Of Multifactor Authentication Technology For Protecting Student Privacy: A Systematic Literature Review. Edum Journal, 7(2), 253-269.
- Hu, X., Ng, J., Tsang, K. K., & Chu, S. K. (2020). Integrating mobile learning to learning management system in community college. Community College Journal of Research and Practice, 44(10-12), 722-737. [CrossRef]
- Daga, K., Viswanath, K. C., & Shankar, K. P. (2024, July). Single Sign-On and application integration using cloud Okta. In AIP Conference Proceedings (Vol. 3075, No. 1, p. 020085). AIP Publishing LLC.
- Chatterjee, P., Bose, R., Banerjee, S., & Roy, S. (2023). Enhancing data security of cloud based lms. Wireless Personal Communications, 130(2), 1123-1139.
- Marroquin, J. P., & Rodriguez, C. R. (2023, December). Quality Assessment Model Based on ISO/IEC 25010 for E-Learning Platforms in the Cloud and Based on Laravel. In 2023 IEEE 15th International Conference on Computational Intelligence and Communication Networks (CICN) (pp. 751-757). IEEE.
- Zaman, N., Khan, A. R., & Salih, M. Designing of Energy aware Quality of Service (QoS) based routing protocol for Efficiency Improvement in Wireless Sensor Network (WSN).
- Khan, A., Jhanjhi, N. Z., Haji, D. H. T. B. A., & Omar, H. A. H. B. H. (2024). Internet of Things (IoT) impact on inventory management: A review. Cybersecurity measures for logistics industry framework, 224-247.
- Gouda, W., Almurafeh, M., Humayun, M., & Jhanjhi, N. Z. (2022, February). Detection of COVID-19 based on chest X-rays using deep learning. In Healthcare (Vol. 10, No. 2, p. 343). MDPI. [CrossRef]
- Chesti, I. A., Humayun, M., Sama, N. U., & Jhanjhi, N. Z. (2020, October). Evolution, mitigation, and prevention of ransomware. In 2020 2nd International Conference on Computer and Information Sciences (ICCIS) (pp. 1-6). IEEE.
- Alferidah, D. K., & Jhanjhi, N. Z. (2020, October). Cybersecurity impact over bigdata and iot growth. In 2020 International Conference on Computational Intelligence (ICCI) (pp. 103-108). IEEE.
- Lim, M., Abdullah, A., & Jhanjhi, N. Z. (2021). Performance optimization of criminal network hidden link prediction model with deep reinforcement learning. Journal of King Saud University-Computer and Information Sciences, 33(10), 1202-1210. [CrossRef]
- Shahid, H., Ashraf, H., Javed, H., Humayun, M., Jhanjhi, N. Z., & AlZain, M. A. (2021). Energy optimised security against wormhole attack in iot-based wireless sensor networks. Computers, Materials and Continua, 68(2), 1967-1981. [CrossRef]
- Ghosh, G., Verma, S., Jhanjhi, N. Z., & Talib, M. N. (2020, December). Secure surveillance system using chaotic image encryption technique. In IOP conference series: materials science and engineering (Vol. 993, No. 1, p. 012062). IOP Publishing.
- Singhal, V., Jain, S. S., Anand, D., Singh, A., Verma, S., Rodrigues, J. J., ... & Iwendi, C. (2020). Artificial intelligence enabled road vehicle-train collision risk assessment framework for unmanned railway level crossings. IEEE Access, 8, 113790-113806. [CrossRef]
- Lim, M., Abdullah, A., Jhanjhi, N. Z., Khan, M. K., & Supramaniam, M. (2019). Link prediction in time-evolving criminal network with deep reinforcement learning technique. IEEE Access, 7, 184797-184807.
- Alkinani, M. H., Almazroi, A. A., Jhanjhi, N. Z., & Khan, N. A. (2021). 5G and IoT based reporting and accident detection (RAD) system to deliver first aid box using unmanned aerial vehicle. Sensors, 21(20), 6905.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).